Alternatively, you can use SCEP to configure the device to automatically obtain a CA
certificate at the same time it receives the local certificate. For details, see the NSM
Online Help description of “Configuring Firewall/VPN Devices.”
Using Certificate Authorities
You must use obtain and install a CA certificate on each VPN member to authenticate
the local device certificates on your managed devices.
Configuring Certificate Authorities
After you have obtained a CA Certificate file (.cer) from your CA, use this file to create a
Certificate Authority object. In Object Manager, select Certificate Authorities, then click
the Add icon to display the New CA Certificate dialog box. Enter a name for the CA
Certificate, then click Load CA certificate and load the appropriate .cer file. NSM uses
the information in the .cer file to automatically complete the Subject Name, Issued By,
and Expired On fields.
Complete the remaining settings:
•
X.509 Certificate Path Validation Level—X509 contains a specification for a certificate
which binds an entity's distinguished name to its public key through the use of a digital
signature.
•
Full. Use full validation to validate the certificate path back to the root.
•
Partial. Use partial validation to validate the certificate path only part of the way to
the root.
•
Revocation Check
•
Check for revocation. Select this option to enable revocation checking.
•
Do not check for revocation. Select this option to disable revocation checking.
•
Revocation Checking Method—If you enabled revocation checking, you can select the
checking method to use. If you did not enable revocation checking, these fields are
unavailable.
•
C
RL. Use a Certificate Revocation List when you want to keep a local copy of the
revoked certificates on the managed device. This method enables the device to
check for revoked certificates quickly; to accept the certificate if no revocation
information is found, also enable Best Effort.
•
OCSP. Use the Online Certificate Status Protocol when you want the managed
device to access a remote OCSP server to check for revoked certificates. Because
the OCSP server dynamically updates its list of revoked certificates, this method
provides the most up-to-date information; to accept the certificate if no revocation
information is found, also enable Best Effort.
•
Best Effort. Enable this option to check for revocation accept the certificate if no
revocation information is found.
•
CRL Settings—Configure the default setting for the Certificate Revocation List.
417
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Objects
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...